首页> 外文期刊>International Journal of Information Security >A secret sharing scheme based on (t, n) threshold and adversary structure
【24h】

A secret sharing scheme based on (t, n) threshold and adversary structure

机译:基于(t,n)阈值和对手结构的秘密共享方案

获取原文
获取原文并翻译 | 示例
           

摘要

The existing secret sharing schemes cannot be applied directly if the threshold and the adversary structures are both needed to meet. A secret sharing scheme which can meet the requirements of both the (t, n) threshold and the adversary structure is proposed basing on the existing (t, n) threshold schemes and the knowledge of set theory, and the validity of the proposed scheme is proved perfectly. The scheme does not need to traverse the whole set of participants to get the qualified or unqualified subsets, and can distribute the shadows according to the requirements of threshold and adversary structure directly. The scheme can prevent the participants from cheating, and does not need the participants to provide their real shadows when the shared secret is reconstructed. The shadows do not need to be renewed when the shared secret is changed. The comparisons to the existing schemes show that, the proposed scheme is more efficient when the threshold and the adversary structure are both required.
机译:如果需要同时满足阈值和对手结构,则不能直接应用现有的秘密共享方案。基于现有的(t,n)阈值方案和集合论知识,提出了一种既能满足(t,n)阈值又能满足对手结构要求的秘密共享方案。证明是完美的。该方案不需要遍历整个参与者集即可获得合格或不合格的子集,并且可以根据阈值和对手结构的要求直接分配阴影。该方案可以防止参与者作弊,并且在重建共享机密时不需要参与者提供其真实的影子。更改共享机密时,不需要更新阴影。与现有方案的比较表明,当同时需要阈值和对手结构时,所提出的方案更加有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号